Home Business IT Security Hackers cause havoc with Wall Street
Hackers cause havoc with Wall Street Featured

A tweet sent from Associated Press @AP account read “Breaking: Two explosions in the White House and Barrack Obama is injured”.

Stock markets plummeted wiping nearly $200 billion off share values in minutes. How could this have happened?

People innately have the need to trust people. The tweet came from a respected source, ergo it is true. Automated trading kicked in and fortunately not for long, mayhem ensued

Syrian Electronic Army, the group claiming responsibility, also claims to have hacked CBS’s 60 minutes and 48 Hours news tweets.

But the reality is that they probably did not hack the accounts at all. The reality is that in order to gain access to a Twitter account a password is needed. You can be sure that AP's is a strong one at that.

How are passwords exposed?

It most likely came from an AP employee, whether willingly or not:

  • Approx 90% of all password breaches are due to bribery or extortion - the weakest link is from within. System Administrators know this but it’s a mammoth task to keep changing all passwords to all web sites etc. The solution is using things like biometrics to verify the user’s identity. See iTWire article
  • Having your mobile device stolen and storing passwords in notes or contacts – Mobile device management is becoming mandatory
  • It could have been a phishing email that convinced the employee to enter their password and login.
  • It could have been malware that seeks out passwords

Whatever the case it is less likely to have come from a brilliant hacker typing very quickly.

How do you protect passwords?

The simplest way is to use a password manager. iTWire has an article here and we simply would like to add one more to the list – Lastpass..

Over the past few weeks I have been trailing this free software and am relatively convinced that it will work over all my computing platforms – Windows, Mac, Android,BlackBerry and more albeit that the mobile versions require a premium subscription for the grand total of $12 per annum. Money well spent.

Still that does not stop the weakest link.



Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.


Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!